Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How to Protect Your PC Grayware Adware, Malware, Spyware.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Understanding security and safe computing. Be Web Wise. Bob Penn presents:
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting Your Computer & Your Information
Viruses.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Types of Electronic Infection
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Understand Malware LESSON Security Fundamentals.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:

Programs designed to infect other computers.

software designed to infiltrate or damage a computer system without the owner's informed consent. Computer viruses, Worms, Trojan horses, Rootkits, Spyware, Hijackers, dishonest Adware, Crimeware.

“Back Doors” “Rootkits” allow other people to access and control your computer

Being an intermediary for an attack on another computer.

Some Trojans function as a mail forwarder, and allow the attacker to transmit spam through the infected system.

A remote administrator can use your computer to store illegal materials.

 Capture and record user keystrokes to obtain passwords or encryption keys

Adware - Software that supports itself or another program by displaying ads. Spyware - Software that gathers and transmits information without your knowledge. Hijacking software - Advertising software programs that change the settings of your browser without your knowledge.

 Currently the biggest threat to personal computing.  Virus-like symptoms.  Earthlink: 29 million spyware-related files on the 1 million computers  Microsoft: 50% of computer crashes  Google: 450,000 sites that install malicious code

You

Keep all applications patched to the most recent level Operating system Internet Browsers programs Word Processors Spreadsheets All Microsoft Products!

1. Use anti-virus software on all Internet-connected computers. 2. Be sure to keep your anti- virus software up-to-date. 3. Use automatic updates of virus definitions when available.

can be exploited by intruders

Don’t run a program unless you know it’s from a trusted source. Never run programs of unknown origin Never transfer programs of unknown origin

Scan with a removal tool often.  Ad Aware  Spybot  MS Malicious Software Removal Tool

Network device Linksys, Netgear, etc. Personal firewall software ZoneAlarm Outpost Firewall Pro Windows Firewall

techniques used to manipulate people into performing actions or divulging confidential information.

An message can appear to come from one source when it was sent from another.

Never open unknown attachments. Know the source. Before opening any attachments, be sure your virus definitions are up-to- date You can save the file to your disk and scan the file using your antivirus software

Messages designed to gather confidential information.

Never send confidential information by Credit card numbers Passwords Never trust links sent by . Service Providers will never ask for your username or password.

Disguise malicious programs LOVE-LETTER-FOR-YOU.TXT.vbs AnnaKournikova.jpg.pif

Using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. A form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser.

Download of spyware, a computer virus or any kind of malware that happens without knowledge of the user. Drive-by downloads may happen by visiting a website, viewing an message or by clicking on a deceptive popup window.

securitycartoon.com

 Windows Firewall  Malicious Software Removal Tool  Google Warnings (StopBadware.org)  McAfee SiteAdvisor - Free plug-in

Warnings at Google from StopBadware.org

McAfee Site Advisor

ShopSafe is a free service that allows you to create a temporary card number each time you make an online purchase. This number links directly to your credit card account number but keeps your card number private and protected.

 Choose another Web Browser  Firefox, Opera  Choose another program  Eudora, Thunderbird  Use a Web Mail service  gmail.com, mail.com, everyone.net

 Disconnect from any network when it’s not in use

Make regular backups of critical data Flash Drive, Floppy Disk External Hard Drive Another Hard Drive or Partition CD-R / CD-RW Another PC on a network

Create an emergency boot disk. Remember, before you have a security event. Save all program media.

The Internet is still a wonderful information resource. Take precautions, but use and enjoy Internet access! Links are online at: